Motivations | Attack goals | Attack approaches | Attack effects |
---|---|---|---|
Greedy/selfish | Maximize the communication performance of the attacker. | Make the SUs believe that vacant portions of the spectrum are busy (i.e., induce false alarms) and access them exclusively. | A global decrease on spectrum sharing efficiency and usage fairness. |
Malicious | Disrupt the performance and operations of the SUs and/or PUs. | Make the other SUs believe that vacant portions of the spectrum are busy. | A decrease in spectrum usage efficiency and, therefore, in the performance of the affected SUs. |
Make the SUs believe that busy portions of the spectrum are idle (missed detections). | A decrease in the protection of the affected PUs against interferences caused by (erroneous) SU transmissions. |